Privacy Laws The United States and Globally

Research laws regarding privacy and data protection in your country and tell us about them. How do they compare to those in other parts of the world?
 

Privacy Laws: The United States and Globally
The protection of personal information has become increasingly important due to internet use that enables personal data to be distributed instantaneously. If you are conducting business in global jurisdictions you do need to be aware that privacy laws are not equal in every country. Use the most restrictive regulatory regimes to avoid difficulties (Carron, 2009).
The United States is a leader in developing new technologies to support internet infrastructure and electronic commerce. As this commerce becomes more global there are concerns about new business models and the technologies that may compromise privacy interests of consumers. Advocates for privacy protections argue that privacy issues need more laws.
The Federal Trade Commission Act was enacted to prevent unfair competition and deceptive acts and practices in national and global commerce. The FTC will take action against companies that fail to comply with privacy policies or misrepresent their information (Standler, 1997).
Title V of The Gramm-Leach-Bliley Act states that privacy relating to personal financial information is essential.  Financial institutions may disclose a consumer’s personal financial information only when subpoenaed by a court of law. Privacy policies must be written and given to every customer of any financial institution. Consumers may opt-out or stop financial institutions from disclosing their account numbers to third parties for use in product promoting.
The Identify Theft and Assumption Deterrence Act of 1998 deem identity theft a federal crime to use without permission or lawful power someone else's identification intending to commit any unlawful activity. The FBI has an entire department dedicated to finding and punishing those who commit identity theft.
The Health Insurance Portability and Accountability Act of 1996 was enacted to protect the privacy of personal health information. These regulations apply mainly to health insurance and clearinghouses as well as health care providers who send out health information via electronic transactions.
Canadian privacy laws are confined in the Personal Information Protection and Electronic Documents Act of 2004. Public health information cannot be transmitted in the provinces of Ontario, Alberta, British Columbia or Quebec. All financial or health information is protected from crossing the border or being used in marketing activities. Privacy of individual consumers is protected in the course of commercial activity.
In 2006 the Privacy Commissioner of Canada decreed that Facebook was in violation of privacy laws in respect to consent and disclosure of personal information to third party developers. Retaining personal information after a subscriber closes their Facebook account, by the social network, constitutes a violation of Canadian law. This same law applies to all social networking sites.
European countries have very sophisticated personal information protections laws. Consent is the lynchpin of most privacy laws in Europe. European laws specify that data collected from individuals must have irrevocable consent before private data is mined. The purpose for data collecting must be stated in writing.
Privacy laws in many other world countries are generally a sub-set of constitutional law. Countries with privacy laws in regards to international trade include Australia, Japan and New Zealand.
Privacy laws in Israeli are legislated by the Information and Technology Authority. This is the body that is in charge of enforcing confidentiality laws in Israel and has in print guidelines on using individual Israeli private information. The one privacy rule indicates that a contract between outsourcing personal data and the individual must be in force. This includes how the information is gathered to the processing of information. All reasons that private information is needed must be documented. To determine when the privacy laws take over, contact the ITA for exact information.
References
·         Racine-Netser, Maya  (2012). Israel: Privacy Protection In Outsourcing Services [Online]. Available: http://www.mondaq.com/x/171764/Outsourcing+Contracting/Privacy+Protection+In+Outsourcing+Services [Accessed on 19 January 2013].

·         Standler, Ronald B. (1997). Privacy Laws: A Report [Online]. Available: http://www.rbs2.com/privacy.htm [Accessed 17 January 2013].

·         United States Privacy Laws (2012). United States Privacy Laws [Online]. Available: http://www.informationshield.com/usprivacylaws.html [Accessed 17 January 2013].

 

These are articles from my masters in software engineering classes. 
Elad Shalom,
CTO at ITweetLive.com

Comments

  1. I was pretty pleased to find this website. I want to to thank you for
    your time due to this fantastic read!! I definitely liked
    every part of it and i also have you saved to fav to check out new stuff in your blog.


    Also visit my webpage architecte d interieur montpellier

    ReplyDelete
  2. Nice post. I learn something new and challenging on websites I stumbleupon every day.
    It will always be exciting to read through articles from other authors and
    practice a little something from other websites.

    Also visit my web site ... Football Heroes Hack

    ReplyDelete
  3. My brother recommended I might like this blog. He wass totally right.

    This post truly made my day. You ccan not imagine simply how much
    ttime I had spent for this info! Thanks!

    Check out mmy web-site; ตู้เชื่อม

    ReplyDelete
  4. Hi there! Do you know if they make any plugins to safeguard against hackers?
    I'm kinda paranoid about losing everything I've worked
    hard on. Any suggestions?

    My web-site: vestidos de fiesta (http://bibliotecadecordoba.com/index.php/Consejos_Para_Comprar_Un_Cigarro_Electronico_De_Calidad.)

    ReplyDelete
  5. I quite like reading an article that will make people think.

    Also, many thanks for allowing me to comment!


    Also visit my web-site; clash of clans hack ()

    ReplyDelete
  6. Howdy! I кnow this is somewhat off topic but
    I was wondering if you knew where I could locate a captcha plugin for
    my comment form? I'm using thе same blog ρlatform aѕ yours and I'm having difficulty finding one?
    Thanks a lߋt!

    Here is my web site - Family Survival Course Review

    ReplyDelete
  7. After looking over a few of the articles on your site, I truly like
    your technique of writing a blog. I book-marked it to my bookmark
    webpage list and will be checking back in the near future.

    Please visit my website as well and let me know how you feel.


    my blog post :: descargar libros para kindle []

    ReplyDelete
  8. Maybe even at one with all the biggest webcam show sites like Live Jasmine.
    Simply being simple and attractive is what issues a lot
    more, think ‘girl and then door’
    . Becoming profitable being a videochat model isn't neither
    a fairly easy nor difficult activity.

    My web-site: slut reviews

    ReplyDelete
  9. The goal is to use an office office fit outs project. Teleconferences such as desks or workstations, office fitouts today.
    So those are too common, found in different pattens & styles and in the industry for over
    25 years, or do we sound? You may be a con-struction wrk would be interested
    to implement tthe best advvice on the amount and size of our service.


    Here is my web blog - homepage ()

    ReplyDelete
  10. Good day! I could have sworn I've been to this website before but after going through
    many of the articles I realized it's new to me. Regardless,
    I'm definitely happy I discovered it and I'll be book-marking it and checking back regularly!



    Check out my web page; شركة نقل عفش بالرياض

    ReplyDelete
  11. Hello it's me, I am also visiting this website
    daily, this website is actually good and the users are really sharing pleasant
    thoughts.

    Look at my web page shadow fight 2 hack (http://shadowfight2hacktool.tumblr.com)

    ReplyDelete
  12. Another advantage that we need to point out is
    the fact that the conversation is safe. Wirechat offers two types of interfaces for the convenience
    of the users namely Feature and Classic. As Baby Boomers become more skillful and comfortable on the internet, they
    are also finding 'friends' from around the globe.

    My web blog - Chaturbate Token Hack

    ReplyDelete
  13. Thank you, I've just been searching for info approximately
    this topic for a while and yours is the best I have came upon till now.
    But, what about the conclusion? Are you positive in regards
    to the supply?

    My weblog ... clash of clans hack tool ()

    ReplyDelete

  14. Listen, they advised me that this site well slot said that it’s not the scam that I decided to take the risk for and while everything was fine and you were on this site?

    ReplyDelete

Post a Comment

Popular posts from this blog

Cloud Computing Advantages and Disadvantages

Linked Files in Visual Studio 2010

BDD, TDD, and Everything Between